The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A multilevel trust management framework in pervasive environment is proposed in this paper. In the framework, the trust, the reputation, reciprocity and related concepts are defined newly. The multilevel discrete trust metric finds a good way to solve the problems, which the granularity of binary trust is coarse and the calculation of continuous trust is complex. The design of storage counter in the...
Trust is a fundamental issue in Pervasive computing, especially when they are applied in unstructured P2P systems. The computational models of trust play an important role in determining who and how to interact in open and dynamic environments. However, current models are not efficient or scalable enough with the expansion of system. To this end, a computation trust model with confidence is proposed...
Deployment of applications and scientific workflows that require resources from multiple distributed platforms are fuelling the federation of autonomous clouds to create cyber infrastructure environments. As the scope of federated cloud computing enlarges to ubiquitous and pervasive computing, there will be a need to assess and maintain the trustworthiness of the cloud computing entities. In this...
Society has grown increasingly reliant on technologies that allow the reproduction of both physical and abstract entities. The ease with which content can be copied has brought widespread benefits, however in many cases these benefits are also contingent on a suitable counter balance of content protection, allowing the process of copying to be restricted in certain circumstances. Dissemination of...
Cloud computing extends an enterprise ability to meet the computing demands of its everyday operations, while offering flexibility, mobility and scalability. However, the reason that chief information officers (CIOs) and their colleagues hesitate to let their business workloads to move from private cloud into public cloud is security. This work tries to offer a line of defense by applying mobile agents...
This paper presents bilateral key handshaking method between patient and medical people. It builds using pseudo inverse matrix investigates to attack an adaptation layer of IP-USNs (IP-base ubiquitous sensor network). It is a healthcare facilities technique among medical people and patient to convey biomedical data accurately and securely. However, the implementation presents a secure global healthcare...
This paper presents an architectural model for wireless peer-to-peer (WP2P) file sharing system for ubiquitous mobile devices. File sharing is one of the rationales for computer networks with increasing demand for file sharing applications and technologies in small and large enterprise networks and on the Internet. With the popularity of mobile phones in day-to-day activities, P2P file sharing in...
Effective security mechanisms are essential to the widespread deployment of pervasive systems. Much of the research focus on security in pervasive computing has revolved around distributed trust management. While such mechanisms are effective in specific environments, there is no generic framework for deploying and extending these mechanisms over a variety of pervasive systems. We present the design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.